33% of all Internet-initiated sex crimes involve social networking sites. 1

Size: px
Start display at page:

Download "33% of all Internet-initiated sex crimes involve social networking sites. 1"

Transcription

1 Did You Know? 33% of all Internet-initiated sex crimes involve social networking sites. 1 STUDENTS: Go to SocialSafety.org for more info on how to protect yourself, what to look out for and how you can help. In 82% of online sex crimes against minors, the offender used the victim's social networking site to gain information about the victim's likes and dislikes. 2 The predominant sex crime scenario doesn't involve violence or stranger molesters posing online as children; only 5% of offenders concealed the fact they were adults from their victims. Almost 80% of offenders were explicit about their intentions with youth. In 73% of crimes, youth go to meet the offender on multiple occasions for multiple sexual encounters. 3 1 Journal of Adolescent Health 47, Journal of Adolescent Health 47, NJOV Study, 2007 PARENTS/EDUCATORS: Go to SocialSafety.org for answers to tough questions like how to approach your kids about online safety.

2 Beware of Predators! It s really easy to be someone you re not on the Internet. After all, who s going to know if you add a couple inches to your height, use a different picture, or add a couple zeros to your net worth? You can be funnier, cuter, more confident -- the ideal version of you. But guess what? If it s easy for you to be someone you re not, it s easy for someone else as well. Anyone who s ever seen an episode of Bones or CSI knows there are people who use the Internet to meet kids for criminal purposes, and they re not always that easy to spot. They re really good at what they do: making friends with and trying to seduce teens into meeting them for sex. Sometimes the predator pretends to be a teenager, trying to meet you on your level. He could have a normal-looking profile with current music, videos, and a picture of a hot teen-next-door, or he might come right out and say he s 35, 47, or 68 years old. There are a lot of these guys. Did you know that 1 in 7 kids received a sexual solicitation online? 4 These guys prey on teens who are unsure of themselves, eager for attention and spend a lot of time online. So all of us, basically. So if you don t want your life to resemble an episode of CSI, there are some things you can do. STATUTORY RAPE IS RAPE! A 20-year-old who meets a 16-year-old for sex will go to jail in many states in the US because it is a crime. Do not allow yourself to be preyed upon by those who would commit such crimes. Question what kind of person would risk jail time to meet a teenager for sex. Question what else would they do? Would they forcibly rape you? Blackmail you? Kidnap you? The red flag needs to go up. Only a bad, potentially dangerous adult will meet Remember, people aren t always who they say they are. That cute, blonde sophomore you met the other day could be a 50-something-year-old man with a weakness for a 14-year-old. It s more than possible. So watch what you say online. Don t post personal information or revealing pictures in your profile. Once an image or bit of information is put online, you can t control it. Your pic could end up on a pedophilic porn site, your face could be photoshopped to a porn star s body and ed all over, your mom could find it. I used to have my cell number posted on my profile, but after the third creepy call from a guy I didn t know, I took it down. a teen for sex. It is a crime. Report inappropriate behavior to Report it! web administrators. That s what the Report Abuse! button is for! If you feel really threatened, call the cops. In most states it s illegal for an adult to have a sexually explicit conversation with a minor, and if an adult tries to send you pictures or get pictures from you, that s definitely illegal! 4

3 Ways to Report an Online Predator If you think there is a threat to your safety or well being, call 911, or your local police immediately. Let them know that a stranger has threatened you online, and that you would like to make a report. You will never get in trouble for making such a report, even if it turns out the predator wasn t real. Submit a report to the CyberTipline. The CyberTipline is an agency that was created by the United States Congress to take reports of abusive behavior towards children on the Internet. Reports can be submitted anytime 24/7 at cybertipline.com, or toll free at Submit a report to the web site s admins. This step will not protect you but is important to protect other users. You will be helping to build a history on a potential predator. Click the Report Abuse! link and send in a report. The site s admins will investigate it and possibly remove the user. Remember, if you sense any threat or danger, you need to call the police immediately. No Safe Way to Meet Up REMEMBER Sexting could be considered manufacturing and distribution of child pornography. 7 Remember, there is no safe way to meet up with someone in real life that you originally met online, but if you must meet someone, follow these tips: Get to know them: Talk with them for a while online before even considering taking things offline. Call and video call them: Make sure they are who they say they are, see what they look like, and hear their voice. If they don t want to talk on the phone or video chat before meeting you, don t meet up with them. Tell a close friend or family member: Before meeting someone in person, tell someone who you trust where you are, whom you are with, how to contact you, and when you should be back. Bring a friend: Bring another person you trust with you to the meeting. Meet in a public place: Never, under any circumstances, meet in a private location. Meet at a mall or a coffeehouse, and don t accept a ride to be picked up and driven to the location. Only meet them in the public place, and don t let them take you back home. Keep where you live unknown.

4 Stop Cyber Bullying Cyberbullying has real effects. Megan Meier, a 13-year-old girl, became friends with a boy, Josh Evans, on MySpace. They became friends, but one day, he changed, and he started saying that she wasn t very nice to her friends. That snowballed into public bulletins saying she was a slut and fat. On October 16, 2006, she got her last message from Josh, Everybody in O'Fallon knows how you are. You are a bad person and everybody hates you. Have a shitty rest of your life. The world would be a better place without you." Her parents found her hanging in her closet later that night. Josh Evans never existed; an ex-best friend s mother created the account, and Megan Meier didn t live to see her fourteenth birthday. To learn more about Megan Meier, visit the Megan Meier Foundation: meganmeierfoundation.org. WHAT IS CYBERBULLYING? Flaming: the posting of derogatory remarks on someone else s webpage or IMing nasty remarks to someone. Mostly, it s online fights filled with bad language. The best way to deal with flaming is to ignore it. Impersonation: When a person logs into someone else s account and sends out messages pretending to be that user. Guess what? This is a form of identity theft, and it is a federal crime! It s prosecuted as a Class C Felony, which can bring with it 2-8 years in jail and up to $10,000 in fines. Bad Mouthing: This can include creating profiles that make fun of another person, erecting blogs that rate people in your class or creating home pages that make fun of others. Authorities can take this very seriously. There are many documented cases of mean comments or even excessive profanity on Twitter and Facebook leading to expulsion from school. Tyler Clementi, an 18-year-old freshman at Rutgers University, jumped off the George Washington Bridge in September 2010, after finding out that his roommate, Dharun Ravi, used a webcam to stream Tyler kissing another man. Ravi also invited his Twitter followers to view it. This invasion of privacy and cruelty led to Clementi s death. To learn more about Tyler Clementi, visit the Tyler Clementi Foundation: thetylerclementifoundation.org. Dealing with Bullies Cyberbullies use the Internet to harass you. These jerks use the Internet to harass people they don t like, friends they re mad at, or total strangers. Cyberbully attacks are especially cruel because a lot of the time, you don t know where they re coming from. Cyberbullying comes in a few guises. There are the one-on-one messages, someone could distribute your personal information or embarrassing photos through s, texts, or postings on a website, or someone could actually be trying to hack your computer or website through viruses or DOS attacks or something else. Being bullied hurts all the time, whether it s in the real world or online. Extreme forms of cyberbullying can lead to suicide. Watch what you say online, and if you re getting harassed online (or offline).

5 Dealing with Bullies (cont.) Here are some things you can do to make bullying stop: Call Someone. Victim advocates associations like the Stalking Resource Center or Safe Horizon ( HELP) can help you assess threats and explain your legal options. If you sense a threat, call 911 and get law enforcement immediately. Block the harasser. It is the easiest way to knock out harassment. Delete the profile, blog, or IM account that is being attacked. If they don t know where to find you, they cannot harass you. You can always start a new blog, profile, or IM account. Document the harassment. All texts, IMs, and s should be saved to show to the proper authorities if the harassment continues. Ignore them. Really, it works. Most bullies are trying to get a rise out of you, so don t give it to them! Block their IMs, delete their s, and take them off your friends list. If you don t give them a reaction, they ll get bored and move on. Report them to web admins and their ISP or web host. If someone s posted your address or picture without your permission, you can probably get their host to take it down. But it might be a complicated process, and you will be asked to provide proof that you re who you say you are. If you need help getting through the bureaucracy, ask your school s IT director or your parents for help. Report Violence and Self-Harm NEED SOMEONE TO TALK TO? Call the National Suicide Prevention Hotline: Suicide is the third leading cause of death among year-olds. 5 Being a teenager is scary, stressful, and confusing. Social media gives kids who are in trouble lots of places to go for help, and it also gives them a bunch of opportunities to ask for help if they need it. If you find one of these cries for help on a friend s blog or in a status update, you ll probably want to help, but you ll probably also be a little freaked out and not really sure how to help. 5

6 Report Violence and Self-Harm (cont.) Here are some things to do if you find someone online who s threatening to hurt or kill themselves, or whom you think might be in danger: CALL 911: This is really important. If you believe the person is in immediate danger of hurting himself or herself, call 911 immediately and tell the operator that you want to report a suicidal person. If you can, tell the operator exactly where the person lives. If you can t, give as much information as you can: full name, age, gender, general location, screen names, addresses, IP address, where the threats were posted, and anything else you can think of. Right away, call the person if you have their phone number or find some other way to get in touch with them through s or IMs or whatever. It s important to get them to talk about what s wrong and make sure they know they re not alone. Tell someone! Track down a web moderator, talk to your school guidance counselor, your favorite teacher, your pastor or rabbi, or even your parents. They ll be able to help you make sure the person is okay. If you ve been asked to keep suicidal behavior secret, don t! Some secrets shouldn t be kept. Suicide is the third leading cause of death among those years old. People who are suicidal almost always show some warning signs beforehand. For more information about violence, suicide, and self-harm, check out ReachOut.com. Preventing Another Columbine or Virginia Tech at Your School Did you know that each of these shootings could have been prevented? Eric Harris, one of the shooters at Columbine, set up a blog nearly three years before the massacre that spoke of his plans. An English professor reported Seung-Hui Cho to the campus-counseling center. To help prevent these tragedies, always take threats seriously and encourage your school to have an anonymous tip box to promote an atmosphere of school safety.

7 Hackers, Phishers, and Scammers What is a hacker? A hacker is a person who will try to gain access to your account that you did not authorize. When they gain access to your account, they can post as you, message your friends, delete your account, and possibly even gain access to your other accounts. They can ruin your reputation, bully others, and do other destructive things. To keep people out of your account, follow these password security tips: Make your password hard to guess by using a combination of upper and lower case letters, numbers, and special characters. Change your password often. Do not use the same password with more than one account. Think about it: If you use the same and Facebook password, and someone found out your Facebook password, they can log into your and potentially gain access to every single account that that address is associated with by using forgot my password links. Do not write your password down where someone else can find it. Don t put it on a post-it near your computer. Keep it safe. Don t tell anyone your password. Even if it is your best friend or significant other, no one should know your password. What is phishing? Phishing is a way for bad people to steal your identity. Phishing scams will send links to you that are supposed to take you to a trusted site. It could be an that looks like it came from your bank or it could be a link that seems to force you to re-sign into your account to save your account from deletion. No matter the form it s a scam. To protect against phishing you should follow these tips: Don t ever give any personal information over or private message. If your bank needs to confirm your account number, call them using the number on the back of your bankcard don t respond to the . Reputable sources will never ask you for your account information in this way. Don t click on links within s or in private messages. SCAMS Watch out for people who send you a messages or post into your feed about how you won a lottery, a new computer, or anything else. Don t believe in anything that seems too good to be true, because it probably is. If you didn t enter anything you didn t win. Never give your bank account information or any other personal information out online. Login to the company s website by typing in the URL into the address bar don t sign in through any links from the or message

8 Reaching Parents So your parents are totally clueless about the Internet and mobile devices? Here are some websites you can send them to teach them everything they need to know about the Internet: SocialSafety.org: a guide to online safety for teens and tweens and social networking safety. WiredSafety.org: all-inclusive, free resource focusing on Internet safety, help and education for Internet users of all ages. MissingKids.com: The National Center for Missing & Exploited Children. ConnectSafely.org: a guide for parents, teens, educators, advocates interested in the impact of the social Web. OnGuardOnline.gov: an informative and complete resource on Internet safety. Hello Blog, Goodbye Job! TELL THEM... Let your parents know you re being responsible online. You should tell your parents What sites and mobile apps you use Why you use these sites and apps Who you talk to online How you keep yourself safe Do you know who s looking at your blog, your Twitter or Facebook profile? Your teachers, the cops, college admissions counselors, your boss, the director of that internship you want, and your mom are. Half of potential employers will reject a worker after looking at their Facebook page. 6 Did you hear about the guy who stole over $200K from Seattle banks and then posted about his exploits on Facebook? 7 How about the kid who got busted for possession when he posted pictures of himself hitting a bong? Untagging yourself in inappropriate pictures isn t enough if it s online, consider it public. If you have a picture or post that you would be devastated if the whole world saw, delete it. Police, teachers, and guidance counselors have been getting training in navigating sites like Facebook and deciphering the blogosphere, and employers and admissions officers will check it out, too. Watch what you post online. Here are a couple things you can do to cover yourself: Don t post stupid things online. No scantily clad photos, nothing about drugs, alcohol, or sex. If you absolutely must must must post the exposés of your life, lock them so they re Friends Only or Private. But remember that even locked, there s still a good chance someone you don t intend to see it could view it

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Did You Know? What s Inside: STUDENTS: PARENTS/EDUCATORS: Beware! Predators!!... 1. Dealing with Bullies... 2. Hello Blog, Goodbye Job...

Did You Know? What s Inside: STUDENTS: PARENTS/EDUCATORS: Beware! Predators!!... 1. Dealing with Bullies... 2. Hello Blog, Goodbye Job... A Public Service By: Did You Know? 22% of 16-17 year olds had a face-to-face meeting with someone they met online. (NCMEC - National Center for Missing and Exploited Children) 1 in 7 teens have been sexually

More information

CyberbullyNOT Student Guide to Cyberbullying

CyberbullyNOT Student Guide to Cyberbullying CyberbullyNOT Student Guide to Cyberbullying WHAT IS CYBERBULLYING? Cyberbullies use the Internet or cell phones to send hurtful messages or post information to damage people s reputation and friendships.

More information

A Time to Tell Troop Meeting Guide

A Time to Tell Troop Meeting Guide A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

National Cybersecurity Awareness Campaign Families Presentation

National Cybersecurity Awareness Campaign Families Presentation National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security

More information

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences

Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying

More information

Cyberbullying. Welcome!

Cyberbullying. Welcome! Cyberbullying Welcome! In this tutorial, we will introduce information about cyberbullying including what it is, how it happens, technology issues related to it, and what can you do about it. We will also

More information

Affirmative Action Presentation

Affirmative Action Presentation Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,

More information

Predators will use information obtained from children to gain trust and friendship

Predators will use information obtained from children to gain trust and friendship 1 We will be discussing several topics during this presentation, including online relationships, the importance of keeping personal information private, protecting your reputation, cyber bullying, and

More information

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service

Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for

More information

Cyber Safety For Parents

Cyber Safety For Parents Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

More information

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney

think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! Using Digital Communication Responsibly Developed by Jonathan W. Blodgett Essex District Attorney think before you send! A Message from the District Attorney The use and capabilities

More information

Protect Your Privacy Online

Protect Your Privacy Online Protect Your Privacy Online By Kathiann M. Kowalski Keep personal information private for your own good! High school sophomore Karra H. never expected to see herself on a Web site featuring scantily clad

More information

Bullying 101: Guide for Middle and High School Students

Bullying 101: Guide for Middle and High School Students Bullying 101: Guide for Middle and High School Students A guide to the basics of bullying, what it is and isn t, the role of students, and tips on what you can do. 952.838.9000 PACERTeensAgainstBullying.org

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET

UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really

More information

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?

SCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone? SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers

More information

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life. Internet Safety Kit A wake-up call for safer surfing online for the young people in your life. From the Polly Klaas Foundation Includes free download of Wired With Wisdom, an Internet safety program for

More information

2010 Middle School Internet Safety Survey Results

2010 Middle School Internet Safety Survey Results When you are online, people can say whatever they want. ~ 8th Grader A friend pressured me to tell her my password. ~ 5th Grader Plainview Old Bethpage Central School District 21 Middle School Internet

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Outsmarting On-line Predators. Christina Kilbourne

Outsmarting On-line Predators. Christina Kilbourne Outsmarting On-line Predators Christina Kilbourne Some Surprising Stats 26% believe their parents would be concerned if they knew what they were doing on-line over half have given out personal information

More information

Lessons for Teens: Risky Internet and Social Networking

Lessons for Teens: Risky Internet and Social Networking Lesson Plan # 4 Online/Electronic Lure Presenter Overview: Most teens regularly and safely interact online with people they don t know via social networking, media and gaming sites. Although news organizations

More information

E-Safety Issues and Online Safety

E-Safety Issues and Online Safety E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

More information

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

More information

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.] 1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.

More information

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and

More information

Chapter 3. Online Bullying

Chapter 3. Online Bullying Chapter 3 Online Bullying Children and teens often face online cruelty (as well as cruelty in the real world). For younger kids, instant messaging and texting can become platforms for teasing and meanness.

More information

How To Deal With Social Media At Larks Hill J & I School

How To Deal With Social Media At Larks Hill J & I School LARKS HILL JUNIOR & INFANT SCHOOL Social Media Policy Written: Reviewed Autumn Term 2015 Larks Hill J & I School Social Media Policy 1. Introduction For the purposes of this policy, social media refers

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

15 Dangerous Apps Every Parent Should Know About

15 Dangerous Apps Every Parent Should Know About 15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges

More information

Social Media Guidelines Resource

Social Media Guidelines Resource Social Media Guidelines Resource ERASE Student Advisory Introduction The purpose of this document is to provide best practice information and guidance to students, parents and teaching staff regarding

More information

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 )

Cyber-Bullying. (Adapted from Olweus, Dan and Susan P. Limber. Olweus Bullying Prevention: Teacher Guide, Hazelden Publishing, copyright 2007 ) Cyber-Bullying - Using technology to repeatedly and on purpose say or do mean or hurtful things to another person who has a hard time defending himself or herself. (Adapted from Olweus, Dan and Susan P.

More information

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction

Cyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org

A Parents' Guide to. Snapchat. 2013 ConnectSafely.org A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their

More information

A Parent s Guide to Social Networking Sites

A Parent s Guide to Social Networking Sites A Parent s Guide to Social Networking Sites Five Lessons to Keep Your Kids Safe When They Socialize Online fa ye boo web mod. book.c club pe myspace facebook club peng.com yomo space webk yomod.com facebook

More information

E-Safety Issues and Online Safety. Parents Evening

E-Safety Issues and Online Safety. Parents Evening E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Cyberbullying: What Parents Can Do to Protect Their Children

Cyberbullying: What Parents Can Do to Protect Their Children Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY: FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

More information

THE LITTLE BIG BOOK OF BADNESS

THE LITTLE BIG BOOK OF BADNESS THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito

CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)

More information

It s hard to know what to do when you know or suspect that a friend or family member is living with violence.

It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How can you help? A B It s hard to know what to do when you know or suspect that a friend or family member is living with violence. How do I know what is the right thing to do? Should I say something or

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013

By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 By Augusta Epuli Anjoh April 2013 Cyber security forum 2013 What is a cyber space? The electronic medium of computer networks, in which online communication takes place. The American Heritage Science Dictionary

More information

How To Avoid The Identity Theft Predators

How To Avoid The Identity Theft Predators Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart

More information

Related KidsHealth Links

Related KidsHealth Links Grades 9 to 12 Personal Health Series KidsHealth.org/classroom Teacher s Guide This guide includes: Standards Related Links Discussion Questions Activities for Students Reproducible Materials Standards

More information

Social Networking Sites like Facebook, MSN

Social Networking Sites like Facebook, MSN Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

More information

Safety Tips for Social Networking

Safety Tips for Social Networking Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

More information

Current Internet Facts

Current Internet Facts Current Internet Facts Facts about Online Predators and Strangers online: Twenty-eight percent of tweens (ages 8 to 12) have been contacted over the Internet by someone they don t know (COX Tween Internet

More information

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force

Internet Crimes Against Children. Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Sergeant Talia Divita Crimes Against Children Unit WV ICAC Task Force Crimes Against Children Unit SECTIONS CPU ICAC DFU WVMCC WV3C Crimes Against Children Unit WVSP Organizational Change December 1, 2009

More information

www.xxxchurch.com Online Predators & Strangers

www.xxxchurch.com Online Predators & Strangers www.xxxchurch.com Online Predators & Strangers When children go online, they have direct access to their friends and family members, but they also may come into contact with complete strangers. Through

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Grade 2 Lesson 3: Refusing Bullying. Getting Started

Grade 2 Lesson 3: Refusing Bullying. Getting Started Getting Started Lesson Concepts You can refuse to let bullying happen to you or to others. Being assertive is one way to refuse bullying. Key Words Refuse, assertive Objectives Students will be able to:

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour:

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step #300005. Name: Hour: #300005 Name: Hour: VIDEO WORKSHEET Review Directions: After watching Digital Footprint: Watch Where You Step, answer the following questions. Your Digital Identity A Permanent Step 1. What is a digital

More information

Class 2: Manage Your Digital Footprint. Student Handbook

Class 2: Manage Your Digital Footprint. Student Handbook Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned I know I want to know I learned How to keep personal information private online. Give Examples: How to keep personal

More information

NET CETERA Chatting with Kids About Being Online

NET CETERA Chatting with Kids About Being Online NET CETERA Chatting with Kids About Being Online People of all ages are: connecting with friends and family online Communicating online is a way of life, yet it comes with certain risks: Inappropriate

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

Empowering young people to be safe on the Internet. Information for parents, teachers and community members

Empowering young people to be safe on the Internet. Information for parents, teachers and community members Empowering young people to be safe on the Internet Information for parents, teachers and community members Empowering parents, teachers, & community members!! IBM is providing the following information

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766

FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY. www.cheezo.org 303-271-6766 FIRST JUDICIAL DISTRICT ATTORNEY S OFFICE INTERNET AND CELL PHONE SAFETY www.cheezo.org 303-271-6766 A Message from District Attorney Peter Weir One of the priorities of the District Attorney s Office

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Social Networking Sites A Predator s Playground?

Social Networking Sites A Predator s Playground? Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every

More information

Internet Safety Fact Sheet Facts about Social Networking:

Internet Safety Fact Sheet Facts about Social Networking: Internet Safety Fact Sheet Facts about Social Networking: 96% of students ages 9 to 17 who have access to the Internet have used social networking technologies (Grunwald Associates, "Creating & Connecting

More information

Today s teens use technology more than ever. Most have

Today s teens use technology more than ever. Most have Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social

More information

Social Media and Cyber Safety

Social Media and Cyber Safety Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today

More information

Youth Online Behavior

Youth Online Behavior Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology

More information

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor

effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Social Media and its effects on youth Daniel J. Flannery PhD Dr. Semi J. and Ruth Begun Professor Director, Begun Center for Violence Prevention Research & Education Mandel School of Applied Social Sciences

More information

THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT

THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT THE STOP.THINK.CONNECT. CAMPAIGN: GEORGE MASON UNIVERSITY CYBERSECURITY AWARENESS EVENT NATIONAL CYBER SECURITY AWARENESS MONTH October is National Cyber Security Awareness Month (NCSAM)! NCSAM engages

More information

Cyberbullying. How common is cyberbullying?

Cyberbullying. How common is cyberbullying? Cyberbullying Bullying is aggressive behavior that is intentional and involves an imbalance of power or strength. Usually, it is repeated over time. Traditionally, bullying has involved actions such as:

More information

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Cyber-Safety Keeping Australians Safe Online

Cyber-Safety Keeping Australians Safe Online Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people

More information

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers Cyberbullying Understanding and Addressing Online Cruelty Students Handouts and Supporting Materials for Teachers Elementary Level Lesson: Building a Foundation for Safe and Kind Online Communication Resources

More information

Internet Safety Guide for Parents.

Internet Safety Guide for Parents. Internet Safety Guide for Parents. Parents Guide Cover: Photo of teenager. A shark is falling out of his schoolbag and saying, C U L-8-R. See You Later. how safe is your child from cyber-sharks? Thomas

More information

Internet Safety Guide for Parents

Internet Safety Guide for Parents Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both

More information

Internet Safety Guidelines

Internet Safety Guidelines Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can

More information

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau

Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Lt. Anthony Ritter New Jersey State Police Cyber Crimes Bureau Good evening, I am Lt. Anthony Ritter of the New Jersey State Police, Cyber Crimes Bureau. I will be taking the next few minutes to explain

More information

Online Safety How to Protect Yourself and Your Family

Online Safety How to Protect Yourself and Your Family Online Safety How to Protect Yourself and Your Family Introduction Surfing the internet can be a very positive experience, it opens up a world of possibilities for everyone, expanding our horizons by exposing

More information

Safer Internet Day Quiz

Safer Internet Day Quiz Safer Internet Day Quiz Safer Internet Day 2014 is all about helping to create a better internet together. But do you make good decisions online? Test your internet safety knowledge by taking our Safer

More information

SOCIAL NETWORKING SITES

SOCIAL NETWORKING SITES YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,

More information

E-safety: Protecting your child online. Information for parents

E-safety: Protecting your child online. Information for parents E-safety: Protecting your child online Information for parents Introduction How children use the internet All children use computers at school, at home or in places like libraries and clubs, and schools

More information

FIRBANK GRAMMAR SCHOOL

FIRBANK GRAMMAR SCHOOL FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

More information

Statutory Rape: What You Should Know

Statutory Rape: What You Should Know Statutory Rape: What You Should Know 2013 Why Do You Need To Read This? Many teens are concerned about the laws regarding something commonly called statutory rape. This brochure will explain what statutory

More information

Why is it important?

Why is it important? Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone

More information